answersLogoWhite

0

📱

Computer Network Security

Network security is any form of computer security dealing with multiple computers linked through a network. Questions about everything from firewalls to viruses to denial-of-service attacks belong here.

1,030 Questions

How can I know the person who hacked my network?

well... just be strange round the people u let in thier house and if they get real nervous then start asking them questions and then u found ur person :)

Who invent the network security?

There is no one person "responsible" for network security in terms of "inventing" it. There are many people over a period of decades that have contributed to some aspect of security.

Where can one find a list of network security companies?

One can go online to find a list of network security companies. Some of the websites one might visit include Technology Evaluation Centers, Vcsdata, Ranker and SecurityList.

What are the character traits for network security analyists?

From my experience, network security analysts should have the following character traits:

Honesty

Curiosity

Trustworthiness

Persistence - not easily discouraged

Humility, i.e. willingness to admit ignorance coupled with a commitment to find the answer

Discretion

In addition, a network security analyst should also have the following Non-character traits:

Intelligence

Extensive knowledge of computer security, especially the applicable laws, policies and procedures that apply to the network they are working with

Skill on methods for securing computers and computer networks

Skill in using network analysis tools such as Nessus, Snort, Netcat, Metasploit, Kismet, or tcpdump. There are lot of them, but a good analyst is skilled with enough of them to do his or her job well.

Understanding of the operating systems and applications in use on the network

Skill in database security if a DB is present on the system.

Skill in router and switch administration and security.

Skill in Intrusion Detection Systems (IDSs) and Intrusion Prevention Systems (IPSs)

Resources to identify people who have any skills that they lack - for example, if they don't have sufficient skills on routers and switches, they should be able to identify someone with those skills to team up with.

Do you install a firewall before or after a router?

It depends on... If you want to protect your router and network install it before. If your router is safe and can handle intrusions install it after. Usually firewall comes first. Also it allows to control the traffic.

How does asymmetric key encryption ensure non repudiation?

The assumption is that if someone's public key works to validate the signature on a transmission, they must have been the one who sent it since they (presumably) are the only one who has the private key necessary to sign. Of course if the private key is compromised, their signature can be effectively forged. This is one reason keeping revocation lists current is so important and why someone should quickly get their key revoked if they believe the private key has been compromised.

What is meant by the term securing your perimeter network security?

your perimeter network is the network you operate such as you have the internet and your network your network is your perimeter

Is computer hacked when programs running in background?

A system can be hacked by programs running in either the foreground or the background; it all depends on their stability and security preparedness.

What is the best book on tcp-ip?

There is no "best" book on any technical subject. It depends on your background of knowledge, whether you want an overview or detailed understanding, and for TCP/IP it usually takes a series of books to completely describe it.

How does one secure a server from a ransomware attack?

On the off chance that your site has malware on it, you're facilitating record's security was traded off and somebody has transferred malignant programming (i.e. malware) to it.

There are numerous approaches to determine the issue, however will cover the speediest and most straightforward approach to settle your site.

you have to choose best hosting provider for your business website data.

Which physical access security model utilizes two sets of doors?

A man-trap in modern physical security protocols refers to a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens.

How many network cards are between 0020afcd5223 through 0020afcd522e?

Using Hexadecimal system from 0123456789ABCDEF we can see that the last digit on both cards are changed. So there would be 10 cards in between the 2 initial ones and 12 including them.

Security system lock down?

Go to control pannel and select security file

What does a flood guard protect against?

1- TCP SYN flood, 2- ICMP foold --> which are DoS attacks

3- Ping sweeps, 4- Port scans --> which are Reconnaissance attacks

Why information systems and networks are vulnerable to security threats?

There are many reasons why either systems or networks are vulnerable:

  1. System software vulnerabilities
  2. System not up to date with patches
  3. Application software not patched
  4. Mis-configured systems and applications
  5. Applications that are not security sensitive
  6. Constantly evolving threats from external sources
  7. Human Error
and more ...

What are the Six specific benefits of computer networking?

In my view, there are really only two reasons for computer networking:

  1. To share resources with others
  2. For security, to secure information and resources.
I'm sure there are other reasons, but these are the two main reasons for networking.

What it means 256 bit encryption. is that means all possible combinations?

256-bit means there is 256 characters within the encryption alphabet.

Just like Binary, Bi-Nary, Bi meaning 2. And when you speak Binary, you only use 2 characters. 0 and 1.

with 256-bit there is 256 different characters ranging from 0 to a to # or even different lang characters. 256 is a large number and is hard to crack.

What are five ways that you can reduce or control risk when driving?

Keep your vehicle in top condition, Anticipate the actions of others, Protect yourself and others, Drive only when you're in sound physical and mental condition, make a conscious effort to develop your driving skills.